5G Mobile Communications / / edited by Wei Xiang, Kan Zheng, Xuemin (Sherman) Shen |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (690 p.) |
Disciplina | 620 |
Soggetto topico |
Electrical engineering
Computer communication systems Communications Engineering, Networks Computer Communication Networks |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | An Overview of 5G Requirements -- Spectrum Analysis and Regulations for 5G -- Spectrum Sharing for 5G -- Massive MIMO Communications -- Millimeter-Wave Communications for 5G Mobile Systems -- Non-orthogonal Multiple Access (NOMA) for 5G -- New Multi-carrier Modulation for 5G -- Fundamentals of Faster-than-Nyquist Signaling -- Generalized Frequency Division Multiplexing: A Flexible Multi-carrier Waveform for 5G -- Spectrally Efficient Frequency Division Multiplexing for 5G -- Full-duplex Wireless Communications for 5G -- Device-to-Device Communications over 5G Systems -- M2M Communications for 5G -- Design Techniques of 5G Mobile Devices in the Dark Silicon Era -- Ultra-Dense Network Architecture and Technologies for 5G -- 5G RAN Architecture - C-RAN with NGFI -- User-centered wireless network for 5G -- Energy Harvesting based Green HetNets for 5G -- Resource Management in Sustainable Green HetNets with Renewable Energy Sources -- Resource Allocation for Cooperative D2D Communication Networks -- Fog Computing and its Applications in 5G -- A Conceptual 5G Vehicular Networking Architecture -- Communications Protocol Design for 5G Vehicular Networks -- Next-Generation High-Efficiency WLAN -- Shaping 5G for the Tactile Internet. |
Record Nr. | UNINA-9910136624103321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Backdoor Attacks Against Learning-Based Algorithms |
Autore | Li Shaofeng |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing AG, , 2024 |
Descrizione fisica | 1 online resource (161 pages) |
Altri autori (Persone) |
ZhuHaojin
WuWen ShenXuemin (Sherman) |
Collana | Wireless Networks Series |
ISBN | 3-031-57389-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Acronyms -- 1 Introduction -- 1.1 Background -- 1.2 Security and Privacy of Deep Learning -- 1.2.1 Security Issues in Deep Learning -- 1.2.2 Privacy Issues in Deep Learning -- 1.2.3 Artificial Intelligence (AI) Governance -- 1.3 Motivation and Challenges -- 1.3.1 Motivation -- 1.3.2 Challenges in Backdoor Attacks -- 1.3.2.1 Backdoor Attacks in Computer Vision -- 1.3.2.2 Backdoor Attacks in Natural Language Processing (NLP) -- 1.3.2.3 Backdoor Attacks in Federated Learning (FL) -- 1.4 Invisible and Hidden Backdoor Attacks -- 1.4.1 Invisible Backdoor Attacks Against Image Classification -- 1.4.2 Hidden Backdoor Attacks Against Natural Language Processing (NLP) -- 1.4.3 Backdoor Detection in Federated Learning (FL) -- 1.5 Aim of the Monograph -- References -- 2 Literature Review of Backdoor Attacks -- 2.1 Applications of Deep Neural Networks -- 2.1.1 Computer Vision Applications -- 2.1.2 NLP Applications -- 2.1.3 FL Applications -- 2.2 Backdoor Attacks -- 2.2.1 Threat Model and Attack Assumption -- 2.2.1.1 Threat Model -- 2.2.1.2 Attack Assumption -- 2.2.2 Implementation of Backdoor Attacks -- 2.2.3 Measurements of Backdoor Attacks -- 2.2.4 Formalization of Backdoor Attacks -- 2.3 Related Works -- 2.3.1 Backdoor Attacks in CV -- 2.3.2 Backdoor Attacks in NLP -- 2.3.3 Backdoor Attacks in FL -- 2.4 Summary -- References -- 3 Invisible Backdoor Attacks in Image Classification Based Network Services -- 3.1 Problem Statement -- 3.2 Background -- 3.2.1 Backdoor Attacks and Detection -- 3.2.2 Steganography -- 3.3 System Design of Invisible Backdoor Attack -- 3.3.1 Threat Model -- 3.3.2 System Overview -- 3.3.3 Attack Performance Measurements -- 3.3.3.1 Performance -- 3.3.3.2 Invisibility -- 3.4 System Implementation of Invisible Backdoor Attacks -- 3.4.1 Attack 1: Adding Triggers via Steganography.
3.4.2 Attack 2: Optimizing Triggers via Regularization -- 3.4.2.1 Step 1: Finding Anchor Positions -- 3.4.2.2 Step 2(a): Optimization with L2 Regularization -- 3.4.2.3 Step 2(b): Optimization with L0 Regularization -- 3.4.2.4 Step 2(c): Optimization with L∞ Regularization -- 3.4.2.5 Step 3: The Universal Backdoor Attack -- 3.5 Performance Evaluation -- 3.5.1 Single Target Backdoor Attacks via Steganography -- 3.5.1.1 MNIST -- 3.5.1.2 CIFAR10 -- 3.5.1.3 GTSRB -- 3.5.1.4 Pollution Rate -- 3.5.1.5 Invisibility Metrics -- 3.5.2 Universal Backdoor Attacks via Regularization -- 3.5.2.1 Performance -- 3.5.2.2 Pollution Rate -- 3.5.2.3 Invisibility Metrics -- 3.5.3 Evading Neural Cleanse Detection -- 3.6 Discussion -- 3.7 Summary -- References -- 4 Hidden Backdoor Attacks in NLP Based Network Services -- 4.1 Problem Statement -- 4.2 Background and Related Work -- 4.2.1 Pre-processing of Language Models -- 4.2.1.1 Language Models -- 4.2.1.2 N-Gram Models -- 4.2.1.3 Neural Language Models -- 4.2.1.4 Pre-processing in the NLP Pipeline -- 4.2.1.5 Pre-processing for RNN/LSTM -- 4.2.1.6 Pre-processing for Transformers -- 4.2.2 Homographs -- 4.2.3 Related Work -- 4.2.3.1 Word Perturbations-Based NLP Backdoors -- 4.2.3.2 Sentence Perturbations-Based NLP Backdoors -- 4.2.3.3 Injecting Trojans into Pre-trained Models -- 4.3 System Design -- 4.3.1 Threat Model -- 4.3.1.1 Attacker's Goals -- 4.3.1.2 Attacker's Knowledge and Capability -- 4.3.2 Attack Overview -- 4.3.3 Attack Performance Measurements -- 4.3.3.1 Performance -- 4.3.3.2 Perplexity -- 4.4 Hidden Backdoor Attacks -- 4.4.1 Attack 1: Homograph Backdoor Attacks -- 4.4.1.1 Homographs Dictionary -- 4.4.1.2 Trigger Definition -- 4.4.1.3 Fine-Tuning to Inject the Backdoor Trojan -- 4.4.1.4 Explaining the Attack from the Perspective of a Tokenized Sentence -- 4.4.2 Attack 2: Dynamic Sentence Backdoor Attacks. 4.4.2.1 Poisoned Sentences Generated via LSTM-BeamSearch -- 4.4.2.2 Poisoned Sentences Generated via PPLM -- 4.4.2.3 Characterizing the Generated Sentences -- 4.5 Case Study: Toxic Comment Detection -- 4.5.1 Experimental Setting -- 4.5.2 Attack Performance Evaluation -- 4.5.2.1 Homograph Attack -- 4.5.2.2 Dynamic Sentence Backdoor Attack -- 4.5.2.3 Comparison with Baseline Attack and Prior Works -- 4.5.3 Overhead Evaluation -- 4.6 Case Study: Neural Machine Translation -- 4.6.1 Experimental Setting -- 4.6.2 Homograph Attack -- 4.6.2.1 Trigger Definition -- 4.6.2.2 Examples of Trigger Sentences -- 4.6.2.3 Poisoned Data Generation -- 4.6.2.4 Results and Analysis -- 4.6.3 Dynamic Sentence Backdoor Attack -- 4.6.3.1 Trigger Definition -- 4.6.3.2 Poisoned Data Generation -- 4.6.3.3 Attack Evaluation -- 4.7 Case Study: Question Answering -- 4.7.1 Experimental Setting -- 4.7.2 Homograph Attack -- 4.7.2.1 Poisoned Data Generation -- 4.7.2.2 Results and Analysis -- 4.7.3 Dynamic Sentence Backdoor Attack -- 4.7.3.1 Results and Analysis -- 4.7.3.2 Attack Analysis on Decision Boundary -- 4.8 Backdoor Defenses in NLP -- 4.8.1 Perplexity-Based Defenses -- 4.8.2 Generative Model-Based Defenses -- 4.8.3 Defense Comparison -- 4.8.4 Heuristic Defense Scheme -- 4.9 Summary -- References -- 5 Backdoor Attacks and Defense in FL -- 5.1 Problem Statement -- 5.2 Background and Threat Model -- 5.2.1 Background of FL in e-Health Tasks -- 5.2.2 Backdoor Attacks and Defenses in FL -- 5.2.3 Threat Model -- 5.3 Backdoor Attack in e-Health FL Scenarios -- 5.3.1 Attack Overview -- 5.3.1.1 Step 1: Poisoning the Attacker's Dataset -- 5.3.1.2 Step 2: Injecting Backdoor -- 5.3.2 Attack Performance -- 5.3.2.1 System Setup -- 5.3.2.2 Measurements -- 5.3.2.3 Attack Results -- 5.3.3 Characteristics of the Attack -- 5.4 Detection Scheme Design -- 5.4.1 Scheme Overview. 5.4.2 Mechanism Design -- 5.4.2.1 BatFL Algorithm -- 5.4.2.2 Leave One Out -- 5.4.3 Algorithm Implementation -- 5.4.3.1 Median Absolute Deviation and Anomaly Index -- 5.4.3.2 Overhead Optimization -- 5.5 Performance Evaluation -- 5.5.1 Detection Performance on Text Classification -- 5.5.2 Detection Performance on Image Classification -- 5.5.2.1 The Accumulated Shapley value -- 5.5.2.2 Monotonicity -- 5.5.2.3 Evaluation on Different Attack Settings -- 5.5.2.4 Performance Comparison with Existing Work -- 5.5.3 Overhead Analysis -- 5.6 Discussion -- 5.7 Summary -- References -- 6 Summary and Future Directions -- 6.1 Summary -- 6.1.1 Invisible Trigger Design in Image Classification -- 6.1.2 Hidden Backdoor Attack Scheme in NLP -- 6.1.3 Backdoor Detection Framework in FL -- 6.2 Open Research Problems -- 6.2.1 Backdoor Attacks Against Robust Machine Learning (ML) Models -- 6.2.2 Defenses Against NLP Backdoors -- 6.2.3 Secure FL Architecture Design. |
Record Nr. | UNINA-9910865259403321 |
Li Shaofeng
![]() |
||
Cham : , : Springer International Publishing AG, , 2024 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Blockchain-Based Data Security in Heterogeneous Communications Networks / / by Dongxiao Liu, Xuemin (Sherman) Shen |
Autore | Liu Dongxiao |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (200 pages) |
Disciplina | 621.382 |
Altri autori (Persone) | ShenXuemin (Sherman) |
Collana | Wireless Networks |
Soggetto topico |
Telecommunication
Cooperating objects (Computer systems) Blockchains (Databases) Communications Engineering, Networks Cyber-Physical Systems Blockchain |
ISBN | 3-031-52477-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Heterogeneous Communications Networks (HCN) -- Fundamental Data Security Technologies -- Reliable Data Provenance in HCN -- Transparent Data Query in HCN -- Fair Data Marketing in HCN -- Future Works -- Conclusion. |
Record Nr. | UNINA-9910835054303321 |
Liu Dongxiao
![]() |
||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cognitive Resource Management for Heterogeneous Cellular Networks / / by Yongkang Liu, Xuemin (Sherman) Shen |
Autore | Liu Yongkang |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (74 p.) |
Disciplina | 621.384 |
Collana | SpringerBriefs in Electrical and Computer Engineering |
Soggetto topico |
Computer communication systems
Electrical engineering Computers Computer organization Computer Communication Networks Communications Engineering, Networks Information Systems and Communication Service Computer Systems Organization and Communication Networks |
ISBN |
1-322-03983-6
3-319-06284-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Cognitive Cellular Network Management (CCN) -- Spectrum Aware Opportunistic Routing for Wireless Backhaul -- QoS-aware Cognitive MAC and Interference Management for Het Net -- Conclusions and Future Directions. |
Record Nr. | UNINA-9910298560903321 |
Liu Yongkang
![]() |
||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cooperative Vehicular Communications in the Drive-thru Internet / / by Haibo Zhou, Lin Gui, Quan Yu, Xuemin (Sherman) Shen |
Autore | Zhou Haibo |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (82 p.) |
Disciplina | 004.68 |
Collana | SpringerBriefs in Electrical and Computer Engineering |
Soggetto topico |
Electrical engineering
Computer communication systems Communications Engineering, Networks Computer Communication Networks |
ISBN | 3-319-20454-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Comprehensive Overview of Research Related Issues -- Spatial Coordinated Medium Sharing in the Drive-thru Internet -- Cooperative Vehicular Content Distribution in the Drive-thru Internet -- Conclusion and Future Research Directions. |
Record Nr. | UNINA-9910299815203321 |
Zhou Haibo
![]() |
||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Decentralized Privacy Preservation in Smart Cities / / by Cheng Huang, Xuemin (Sherman) Shen |
Autore | Huang Cheng |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (178 pages) |
Disciplina | 621.38 |
Altri autori (Persone) | ShenXuemin (Sherman) |
Collana | Wireless Networks |
Soggetto topico |
Cooperating objects (Computer systems)
Telecommunication Data protection - Law and legislation Cyber-Physical Systems Communications Engineering, Networks Privacy |
ISBN | 3-031-54075-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1. Introduction -- Chapter 2. Basic Techniques for Decentralized Privacy Preservation -- Chapter 3. Privacy-Preserving Identity Management in Car Sharing -- Chapter 4. Privacy-Preserving Cross-Domain Authentication in Internet of Things -- Chapter 5. Privacy-Preserving Data Analytics in Usage-Based Insurance -- Chapter 6. Privacy-Preserving Data Search in Cloud Storage -- Chapter 7. Conclusions and Future Research Directions. |
Record Nr. | UNINA-9910845100803321 |
Huang Cheng
![]() |
||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Dynamic Sharing of Wireless Spectrum / / by Haibo Zhou, Quan Yu, Xuemin (Sherman) Shen, Shaohua Wu, Qinyu Zhang |
Autore | Zhou Haibo |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XI, 113 p. 56 illus.) |
Disciplina | 621.382 |
Soggetto topico |
Electrical engineering
Computer communication systems Database management Communications Engineering, Networks Computer Communication Networks Database Management |
ISBN | 3-319-45077-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Overview of Dynamic Sharing of Wireless Spectrum -- Dynamic Wireless Spectrum Sharing in Cognitive Cellular Networks -- Dynamic White Spaces Spectrum Sharing in Vehicular Networks -- Auction-based White Spaces Spectrum Sharing in Multimedia Networks -- Conclusion and Future Research Directions. |
Record Nr. | UNINA-9910136476003321 |
Zhou Haibo
![]() |
||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Enabling Content Distribution in Vehicular Ad Hoc Networks / / by Tom H. Luan, Xuemin (Sherman) Shen, Fan Bai |
Autore | Luan Tom H |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | New York, NY : , : Springer New York : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (114 p.) |
Disciplina | 388.312 |
Collana | SpringerBriefs in Computer Science |
Soggetto topico |
Computer communication systems
Electrical engineering Application software Power electronics Computer Communication Networks Communications Engineering, Networks Information Systems Applications (incl. Internet) Power Electronics, Electrical Machines and Networks |
ISBN | 1-4939-0691-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Medium-size Content Distribution using an Infrastructure-based Approach -- Medium-size Content Transmission over Infrastructure-less Inter-vehicle Communications -- Large-volume Content Distribution in Vehicular Networks: Adaptive Playout from User's Perspective -- Conclusion. |
Record Nr. | UNINA-9910299055903321 |
Luan Tom H
![]() |
||
New York, NY : , : Springer New York : , : Imprint : Springer, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Maritime Wideband Communication Networks : Video Transmission Scheduling / / by Tingting Yang, Xuemin (Sherman) Shen |
Autore | Yang Tingting |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (59 p.) |
Disciplina | 004.66 |
Collana | SpringerBriefs in Computer Science |
Soggetto topico |
Computer communication systems
Electrical engineering Computers Computer organization Computer Communication Networks Communications Engineering, Networks Information Systems and Communication Service Computer Systems Organization and Communication Networks |
ISBN | 3-319-07362-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Background and Literature Survey -- Video Transmission Scheduling in Maritime Wideband Communication Networks -- Green Energy and Content Aware Scheduling in Maritime Wideband Communication Networks -- Conclusions and Future Directions. |
Record Nr. | UNINA-9910298992403321 |
Yang Tingting
![]() |
||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Mobile Electric Vehicles : Online Charging and Discharging / / by Miao Wang, Ran Zhang, Xuemin (Sherman) Shen |
Autore | Wang Miao |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (82 p.) |
Disciplina | 620 |
Collana | Wireless Networks |
Soggetto topico |
Electrical engineering
Computer communication systems Computers Communications Engineering, Networks Computer Communication Networks Information Systems and Communication Service |
ISBN | 3-319-25130-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Charging/Discharging for EVs -- Mobility-Aware Coordinated EV Charging in VANET-enhanced Smart Grid -- Coordinated V2V Fast Charging for Mobile GEVs Based on Price Control -- Conclusions and Future Directions. |
Record Nr. | UNINA-9910254203403321 |
Wang Miao
![]() |
||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|